Home

Description

Owlfiles File Manager 12.0.1 contains a path traversal vulnerability in its built-in HTTP server that allows attackers to access system directories. Attackers can exploit the vulnerability by crafting GET requests with directory traversal sequences to access restricted system directories on the device.

PUBLISHED Reserved 2026-01-10 | Published 2026-01-13 | Updated 2026-01-14 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

12.0.1
affected

Credits

Chokri Hammedi finder

References

www.exploit-db.com/exploits/51036 exploit

www.exploit-db.com/exploits/51036 (ExploitDB-51036) exploit

www.skyjos.com/ (Vendor Homepage) product

apps.apple.com/us/app/owlfiles-file-manager/id510282524 (Official App Store Listing) product

www.vulncheck.com/...es/owlfiles-file-manager-path-traversal (VulnCheck Advisory: Owlfiles File Manager 12.0.1 - Path Traversal) third-party-advisory

cve.org (CVE-2022-50890)

nvd.nist.gov (CVE-2022-50890)

Download JSON